<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: packet_captures.sh - Packet Captures for Dummies in API / CLI Discussion</title>
    <link>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/105101#M5399</link>
    <description>&lt;P&gt;Maybe you can modify your script to check if&amp;nbsp;cppcap is available and use this instead of tcpdump?&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141412" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141412&lt;/A&gt;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2020 07:08:58 GMT</pubDate>
    <dc:creator>Daniel_</dc:creator>
    <dc:date>2020-12-11T07:08:58Z</dc:date>
    <item>
      <title>packet_captures.sh - Packet Captures for Dummies</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/71820#M4285</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;What is packet_captures.sh?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;packet_capture.sh is an open-source community tool which simplifies the way to collect:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;1) tcpdump captures&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;2) FW Monitor captures&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;3) Kernel Debugs &lt;STRONG&gt;*ALWAYS during a maintenance window*&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;More functionality coming when I stop being lazy!&lt;BR /&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;H4&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 id="CPViewer-visualizeyourcpview/cpinfofilesin5minutes-Themainbenefitsare:"&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;The main benefits are:&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;All captures and/or debugs are taken at the same time.&lt;BR /&gt;&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;All captures and/or debugs are zipped into a single .tgz to be pulled from the device&lt;/FONT&gt;&lt;/LI&gt;
&lt;LI&gt;&lt;FONT size="4"&gt;No need to remember tcpdump or FW Monitor syntax&lt;/FONT&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;H4 id="CPViewer-visualizeyourcpview/cpinfofilesin5minutes-CPViewer.ovafiledownload-HERE."&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;packet_captures.sh source code - &lt;A href="https://github.com/Gordon-K/packet_captures" target="_blank" rel="nofollow noopener noreferrer"&gt;HERE&lt;/A&gt;.&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H4&gt;
&lt;H2 id="CPViewer-visualizeyourcpview/cpinfofilesin5minutes-Howtouseit?"&gt;&lt;FONT size="5"&gt;&lt;STRONG&gt;How to use it?&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/H2&gt;
&lt;OL&gt;
&lt;LI&gt;Put Script on GW&lt;/LI&gt;
&lt;LI&gt;Run the following commands from expert mode:&lt;BR /&gt;&lt;CODE&gt;dos2unix packet_captures.sh&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;chmod +x packet_captures.sh&lt;/CODE&gt;&lt;BR /&gt;&lt;CODE&gt;./packet_captures.sh&lt;/CODE&gt;&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&lt;STRONG&gt;Usage ./packet_captures.sh [-s &amp;lt;source IP&amp;gt;] [-d &amp;lt;destination IP&amp;gt;] [-p &amp;lt;port&amp;gt;] [-t] [-f] [-k]&lt;/STRONG&gt;&lt;/P&gt;
&lt;TABLE&gt;
&lt;THEAD&gt;
&lt;TR&gt;
&lt;TH width="41px"&gt;Flag&lt;/TH&gt;
&lt;TH width="770px"&gt;Description&lt;/TH&gt;
&lt;/TR&gt;
&lt;/THEAD&gt;
&lt;TBODY&gt;
&lt;TR&gt;
&lt;TD width="41px" class="lia-align-center"&gt;-s&lt;/TD&gt;
&lt;TD width="770px"&gt;Used to specify source IP for filtering tcpdump and FW Monitor captures. Multiple source IPs can be entered, each IP must be entered in [-s &amp;lt;source IP&amp;gt;] format&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="41px" class="lia-align-center"&gt;-d&lt;/TD&gt;
&lt;TD width="770px"&gt;Used to specify destination IP for filtering tcpdump and FW Monitor captures. Multiple destination IPs can be entered, each IP must be entered in [-d &amp;lt;destination IP&amp;gt;] format&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="41px" class="lia-align-center"&gt;-p&lt;/TD&gt;
&lt;TD width="770px"&gt;Used to specify port for filtering tcpdump and FW Monitor captures. Multiple ports can be entered, each port must be entered in [-p &amp;lt;port&amp;gt;] format&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="41px" class="lia-align-center"&gt;-t&lt;/TD&gt;
&lt;TD width="770px"&gt;Tells script to take a tcpdump on all relevent interfaces based on IPs provided with -s and -d flags. Tcpdump will be filtered according to source IP(s), dedstination IP(s), and port(s) provided to script.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="41px" class="lia-align-center"&gt;-f&lt;/TD&gt;
&lt;TD width="770px"&gt;Tells script to take a FW Monitor capture. SecureXL will be disabled for captures on versions R80.10 and below. FW Monitor will be filtered according to source IP(s), dedstination IP(s), and port(s) provided to script.&lt;/TD&gt;
&lt;/TR&gt;
&lt;TR&gt;
&lt;TD width="41px" class="lia-align-center"&gt;-k&lt;/TD&gt;
&lt;TD width="770px"&gt;Tells script to take Kernel Debugs. Entering only -k flag will default to debugging the fw module with the drop flag (fw ctl debug -m fw + drop). You can select the module and flags that you want to debug by running the -k flag followed by the module and flags in double-quotes like so: -k "-m fw + drop".&lt;/TD&gt;
&lt;/TR&gt;
&lt;/TBODY&gt;
&lt;/TABLE&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="5"&gt;*DISCLAIMER -&amp;nbsp;This open source tool is provided “As Is”.&amp;nbsp; No representations or warranties are provided with the use of this tool.&lt;BR /&gt;&lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 06:07:41 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/71820#M4285</guid>
      <dc:creator>KernelGordon</dc:creator>
      <dc:date>2020-01-08T06:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: packet_captures.sh - Packet Captures for Dummies</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/71821#M4286</link>
      <description>&lt;P&gt;Your code says:&lt;/P&gt;
&lt;P&gt;&lt;FONT color="#800080"&gt;&lt;EM&gt;# FW Monitor syntax changed from R80.20 take 76 onwards&lt;/EM&gt;&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT color="#800080"&gt;&lt;EM&gt;#TODO: Create different FW Monitor filters for new and old syntax.&lt;/EM&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;Well, R80.30 doesn't feature the new simple capture filter (&lt;EM&gt;yet&lt;/EM&gt;), so you need to check whether the system actually features the new -F syntax independently from the version. Also while -F may be available the end user should still be allowed to use the traditional -e &amp;nbsp;command if he/she wants to as this is still supported and may just require disabling of ClusterXL while running fw monitor.&lt;/P&gt;
&lt;P&gt;I like your efforts in this project and I'm also working on a similar one called:&amp;nbsp;&lt;A href="https://community.checkpoint.com/t5/API-CLI-Discussion-and-Samples/FW-Monitor-SuperTool/td-p/60098" target="_self"&gt;FW Monitor SuperTool&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 08 Jan 2020 10:54:28 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/71821#M4286</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2020-01-08T10:54:28Z</dc:date>
    </item>
    <item>
      <title>Re: packet_captures.sh - Packet Captures for Dummies</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/71987#M4292</link>
      <description>&lt;P&gt;Thanks for the input on the script. I added a check for the new FW Monitor syntax with the '-F' flag&amp;nbsp; as well as an error message to alert users when they have run the script will enough IPs and ports to generate over 5 filters.&lt;/P&gt;
&lt;P&gt;The new '-F' flag is very limiting compared to the old '-e' syntax as it can only handle 5 filters and it forces them to all be logical OR...&lt;/P&gt;
&lt;P&gt;I'm really interested in your SuperTool and some of the other scripts you've written. I've learned a little from just going over them. &lt;span class="lia-unicode-emoji" title=":beaming_face_with_smiling_eyes:"&gt;😁&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 09 Jan 2020 22:48:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/71987#M4292</guid>
      <dc:creator>KernelGordon</dc:creator>
      <dc:date>2020-01-09T22:48:40Z</dc:date>
    </item>
    <item>
      <title>Re: packet_captures.sh - Packet Captures for Dummies</title>
      <link>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/105101#M5399</link>
      <description>&lt;P&gt;Maybe you can modify your script to check if&amp;nbsp;cppcap is available and use this instead of tcpdump?&lt;/P&gt;&lt;P&gt;&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141412" target="_blank"&gt;https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk141412&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 07:08:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/API-CLI-Discussion/packet-captures-sh-Packet-Captures-for-Dummies/m-p/105101#M5399</guid>
      <dc:creator>Daniel_</dc:creator>
      <dc:date>2020-12-11T07:08:58Z</dc:date>
    </item>
  </channel>
</rss>

